From: bdolan <71431.2564@CompuServe.COM>
To: <cypherpunks@toad.com>
Message Hash: 82caf48220f5b681ee34af093d8b2a647b26010cc3ccf8b3f0842610135b9025
Message ID: <93120621054071431.2564_FHA55-1@CompuServe.COM>
Reply To: _N/A
UTC Datetime: 1993-12-06 21:20:08 UTC
Raw Date: Mon, 6 Dec 93 13:20:08 PST
From: bdolan <71431.2564@CompuServe.COM>
Date: Mon, 6 Dec 93 13:20:08 PST
To: <cypherpunks@toad.com>
Subject: Digicash question
Message-ID: <931206210540_71431.2564_FHA55-1@CompuServe.COM>
MIME-Version: 1.0
Content-Type: text/plain
TO: >internet: cypherpunks@toad.com
Forgive me for a newbie question. Why wouldn't the following inelegant
idea work?
X gives $101 to First Digital Bank, which gives X a PGP-signed password
representing a claim on $100 (or maybe they would do this just for the
"float"). X gives the $100 password to Y, in exchange for a narco-terrorism
decoder ring. Y, being a cautious soul, calls First DigiBank immediately
and gives it the password. DigiBank pockets $1 and issues Y a new signed
password good for $99. Note that DigiBank (1) doesn't need to know who Y
is and (2) ensures that a given money-password is only spent once. By the
same method, Y can pay Z and Z can deposit the credit in BillnHill's S&L for
settlement. Or the money can keep floating around until DigiBank gets it
all, which is what usually happens now ;-)
Of course, you have to trust the bank - but you have to now, also.
Don't abuse me too much. Just point me to the right FAQ (...cowering...)
bdolan@well.sf.ca.us
Return to December 1993
Return to “Derek Atkins <warlord@MIT.EDU>”